咨询与建议

限定检索结果

文献类型

  • 4,063 篇 会议
  • 37 篇 期刊文献
  • 26 册 图书
  • 1 篇 科技报告

馆藏范围

  • 4,127 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,745 篇 工学
    • 2,419 篇 计算机科学与技术...
    • 2,068 篇 软件工程
    • 891 篇 信息与通信工程
    • 518 篇 生物工程
    • 296 篇 生物医学工程(可授...
    • 287 篇 控制科学与工程
    • 284 篇 电气工程
    • 159 篇 光学工程
    • 155 篇 电子科学与技术(可...
    • 155 篇 化学工程与技术
    • 139 篇 安全科学与工程
    • 135 篇 交通运输工程
    • 123 篇 动力工程及工程热...
    • 117 篇 机械工程
    • 102 篇 仪器科学与技术
    • 92 篇 材料科学与工程(可...
  • 1,561 篇 理学
    • 911 篇 数学
    • 551 篇 生物学
    • 343 篇 统计学(可授理学、...
    • 258 篇 系统科学
    • 248 篇 物理学
    • 166 篇 化学
  • 1,069 篇 管理学
    • 787 篇 图书情报与档案管...
    • 426 篇 管理科学与工程(可...
    • 237 篇 工商管理
  • 259 篇 医学
    • 247 篇 临床医学
    • 241 篇 基础医学(可授医学...
    • 172 篇 药学(可授医学、理...
    • 92 篇 公共卫生与预防医...
  • 173 篇 法学
    • 152 篇 社会学
  • 82 篇 农学
  • 77 篇 经济学
  • 75 篇 教育学
  • 5 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 359 篇 data mining
  • 196 篇 machine learning...
  • 185 篇 machine learning
  • 165 篇 prediction algor...
  • 163 篇 feature extracti...
  • 147 篇 predictive model...
  • 142 篇 deep learning
  • 138 篇 big data
  • 136 篇 training
  • 133 篇 data models
  • 114 篇 clustering algor...
  • 109 篇 support vector m...
  • 101 篇 computational mo...
  • 98 篇 classification (...
  • 85 篇 forecasting
  • 84 篇 neural networks
  • 81 篇 classification a...
  • 81 篇 sentiment analys...
  • 78 篇 heuristic algori...
  • 70 篇 decision trees

机构

  • 20 篇 faculty of infor...
  • 16 篇 school of inform...
  • 15 篇 school of inform...
  • 13 篇 university of ch...
  • 13 篇 vietnam national...
  • 12 篇 school of inform...
  • 12 篇 institute of inf...
  • 12 篇 school of comput...
  • 11 篇 beijing universi...
  • 11 篇 school of inform...
  • 11 篇 school of comput...
  • 10 篇 school of comput...
  • 10 篇 college of infor...
  • 10 篇 school of inform...
  • 10 篇 school of cyber ...
  • 9 篇 school of electr...
  • 9 篇 university of in...
  • 8 篇 school of inform...
  • 8 篇 college of compu...
  • 8 篇 shenzhen institu...

作者

  • 9 篇 li yang
  • 8 篇 wang lei
  • 8 篇 liu yang
  • 8 篇 guo kun
  • 8 篇 gu shenming
  • 7 篇 yang yang
  • 7 篇 wang chao
  • 7 篇 wang tao
  • 7 篇 wang wei
  • 7 篇 zhang yan
  • 7 篇 wang xin
  • 7 篇 li wei
  • 7 篇 zhang liang
  • 7 篇 zhang han
  • 6 篇 li xin
  • 6 篇 xu hao
  • 6 篇 behera h.s.
  • 6 篇 ye jun
  • 6 篇 zhang kun
  • 6 篇 rachmadita andre...

语言

  • 4,063 篇 英文
  • 59 篇 其他
  • 13 篇 中文
检索条件"任意字段=2022 International Conference on Algorithms, Data Mining, and Information Technology, ADMIT 2022"
4127 条 记 录,以下是41-50 订阅
排序:
A novel InfluxDB-based inverted index method  24
A novel InfluxDB-based inverted index method
收藏 引用
3rd international conference on algorithms, data mining, and information technology, admit 2024
作者: Hou, Zhuohan Huang, Qizhi Song, Yuanfeng Fan, Shuhuan Nie, Xiaowen School of ISE University of Electronic Science and Technology of China China Information Center University of Electronic Science and Technology of China China School of CSE University of Electronic Science and Technology of China China
High performance time series database supporting petabytes of data per day;however, the database cannot search the log’s text content. Therefore, this paper proposes an inverted index method for the InfluxDB time ser... 详细信息
来源: 评论
Empirical analysis of enabling high-quality development of digital economy based on grey correlation degree and Moran’s I index  24
Empirical analysis of enabling high-quality development of d...
收藏 引用
3rd international conference on algorithms, data mining, and information technology, admit 2024
作者: Cao, Qian Wang, Xiaocong Institute of Science and Technology Information Beijing Academy of Science and Technology China Institute of Technology and Economics of Grain Industry Academy of National Food and Strategic Reserves Administration China
The index system of digital economy and high-quality development is constructed from multiple dimensions, and the development index of digital economy and high-quality development index are measured by entropy weight ... 详细信息
来源: 评论
Handle-based power terminal access authentication  24
Handle-based power terminal access authentication
收藏 引用
3rd international conference on algorithms, data mining, and information technology, admit 2024
作者: Wang, Xu Zhang, Dahua Hu, Baiji Yao, Shuang Jiang, Lin Yu, Yiying Information and Communication Department China Electrical Power Research Institute Department Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
This paper introduces a handle-based access authentication scheme for power terminals, leveraging the Chinese SM2 cryptographic algorithm. The scheme utilizes the robust security features of SM2 to enhance the authent... 详细信息
来源: 评论
Detecting Unseen Anomalies in Dynamic Graph  24
Detecting Unseen Anomalies in Dynamic Graph
收藏 引用
3rd international conference on algorithms, data mining, and information technology, admit 2024
作者: Wang, Wenkai Zuo, Zeyu Wang, Meihong Wang, Pengfei School of Informatics Xiamen University Fujian Xiamen China Aerospace Science and Industry Network Information Development Co. Ltd. Fujian Xiamen China
In the current era of rapid advancements in information technology, social media serves as a crucial medium for information dissemination and communication. However, detecting and uncovering social risks within this e... 详细信息
来源: 评论
Research on Network Quality Evaluation System Based on the Entropy Weight Method  24
Research on Network Quality Evaluation System Based on the E...
收藏 引用
3rd international conference on algorithms, data mining, and information technology, admit 2024
作者: Ming, Tong Man, Zhu A. Network Information Center Wuhan University of Technology China
Higher education campus networks, as a crucial infrastructure for educational informatization, are experiencing accelerated construction and development. Network quality has become a key indicator for measuring the le... 详细信息
来源: 评论
2nd international conference on Ubiquitous Computing and Intelligent information Systems, ICUIS 2022
2nd International Conference on Ubiquitous Computing and Int...
收藏 引用
2nd international conference on Ubiquitous Computing and Intelligent information Systems, ICUIS 2022
The proceedings contain 57 papers. The special focus in this conference is on Ubiquitous Computing and Intelligent information Systems. The topics include: Survey on Handwritten Characters Recognition in Deep Learning...
来源: 评论
Linking High-Risk Companies to Special Treatment (ST) Status: A Large Language Model Approach for Corporate Risk Evaluation  24
Linking High-Risk Companies to Special Treatment (ST) Status...
收藏 引用
3rd international conference on algorithms, data mining, and information technology, admit 2024
作者: Wang, Hua Kang, Zhaoyu International Business School Zhejiang University Haining China Zhejiang University-University of Illinois Urbana-Champaign Zhejiang University Haining China
Traditional corporate risk analysis has primarily focused on quantitative financial data, often overlooking qualitative factors such as sustainability and corporate governance. This study leverages large language mode... 详细信息
来源: 评论
PL-attack: Projected Light-based Adversarial Attacks against Deep Neural Networks in the Physical World  24
PL-attack: Projected Light-based Adversarial Attacks against...
收藏 引用
3rd international conference on algorithms, data mining, and information technology, admit 2024
作者: Huang, Haojie Chen, Jinyin Zheng, Haibin Chen, Yixin Huang, Haoben College of Information Engineering Zhejiang University of Technology China Institute of Cyberspace Security Zhejiang University of Technology China
The rapid development of artificial intelligence has led to the increasing application of image recognition in autonomous driving and surveillance. However, these systems are often vulnerable to adversarial attacks. I... 详细信息
来源: 评论
Prior Knowledge Distillation Network for Face Super-Resolution  24
Prior Knowledge Distillation Network for Face Super-Resoluti...
收藏 引用
3rd international conference on algorithms, data mining, and information technology, admit 2024
作者: Yang, Qiu Sun, Xiao Li, Xinyu Cui, FengQi Guo, YuTong Hu, ShuangZhen Luo, Ping Li, SiYing School of Computer and Information Hefei University of Technology China Institute of Advanced Technology University of Science and Technology of China China
The purpose of face super-resolution (FSR) is to reconstruct high-resolution (HR) face images from low-resolution (LR) inputs. With the continuous advancement of deep learning technologies, contemporary prior-guided F... 详细信息
来源: 评论
M-Patch: Adversarial Patch-based Physical Attack against Multi-modal Fusion Detectors  24
M-Patch: Adversarial Patch-based Physical Attack against Mul...
收藏 引用
3rd international conference on algorithms, data mining, and information technology, admit 2024
作者: Chen, Yixin Zheng, Haibin Chen, Jinyin Huang, Haojie College of Information Engineering Zhejiang University of Technology China Institute of Cyberspace Security Zhejiang University of Technology China
As reliance on multimodal fusion object detection models grows in critical tasks, ensuring their robustness and security is essential before deployment. However, research on adversarial attacks in multimodal target de... 详细信息
来源: 评论